17-1. 17-2 17 Bankruptcy, Divorce, Identity Theft McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Law Enforcement Implications of House Bill 87 Bill is known as the Illegal Immigration Reform and Enforcement Act of Many different implications.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Legal Document Preparation Class 9Slide 1 Basic Debtor-Creditor Terminology Debtor: person who owes the money Creditor: person to whom the money is owed.
Secured Transactions and Bankruptcy Professor McKinsey OBE 118, Section 10, Fall 2004 In the real world, few goods are paid for in cash. Most are financed.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Bankruptcy and Claims Investigation By Sandy Williams, Jennifer Seidler, and Tonda Lee SmithAmundsen, LLC.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 15-1 Today’s Topics n Shenanigan #5 n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Comprehensive Volume, 18 th Edition Chapter 37: Bankruptcy.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
PERSONAL FINANCIAL MANAGEMENT
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Anti-Money Laundering (AML)
Fraud and SOX Compliance McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
FORENSIC ACCOUNTING - BA Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Tax fraud n Bankruptcy overview n Bankruptcy participants.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 4 Billing Schemes.
Fastest Growing Crime in America. IDENTITY THEFT IS COSTING YOU BIG MONEY. 10 million people are effected by identity theft each year. More than 46 million.
FORENSIC ACCOUNTING - BA124 - Spring 2006Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants n Bankruptcy.
Bankruptcy, Divorce, Identity Theft McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
MONEY MANAGEMENT II Credit Reports. What We’re Covering Today What a credit report is and why it’s important Credit bureau basics What is actually on.
Bankruptcy What is it’s Effect?. Bankruptcy A legal process that relieves debtors of the responsibility of paying their debts or protects them while they.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
G1 © Family Economics & Financial Education – Revised November 2004 – Paychecks and Taxes Unit – Understanding Your Paycheck and Tax Forms Funded.
Understanding Your Paycheck and Tax Forms
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
Copyright ©2011 by Pearson Education, Inc. publishing as Pearson [imprint] Professionalism: Skills for Workplace Success, 2/e Lydia E. Anderson Sandra.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
The AIRCRAFT SAFETY ACT of 2000 H.R Wendell H. Ford Aviation Investment and Reform Act for the 21st Century.
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
Section 6.4 Managing Your Debts. Signs of Debt Problems If you are experiencing 2 or more of the these warning signs it is time for you to rethink your.
Chapter 4 Billing Schemes.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Bankruptcy, Divorce, and Tax Fraud Chapter 16.
Chapter 10 Trustees, Examiners & Creditors Committees.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 20 Creditors’ Rights and Bankruptcy.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Chapter 35 BANKRUPTCY. 2 Bankruptcy Law Jurisdiction over bankruptcy cases is in U.S. district courts, which may refer all cases and related proceedings.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
“The entire essence of America is the hope to first make money—then make money with money—then make lots of money with lots of money.” Paul Erdman.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Fraud Examination, 3E Chapter 16: Bankruptcy, Divorce and Tax Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Identity Theft By: Andrew Hicks. Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Understanding Bankruptcy
Protecting Your Credit Identity
Red Flags Rule An Introduction County College of Morris
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

17-1

Bankruptcy, Divorce, Identity Theft McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

17-3 Bankruptcy Fraud Overview The DOJ Bankruptcy Trustee Manual lists various frauds: Conceals property from the bankruptcy proceedings Makes a false oath or account in relation to a bankruptcy case Makes a false declaration, certification, verification, or statement in relation to a bankruptcy case. Makes a false proof of claim Receives a material amount of property from the debtor with intent to defeat the Bankruptcy Code Gives, offers, receives, or attempts to obtain money, property, reward, or advantage for acting or forbearing to act in a bankruptcy case Transfers or conceals property with the intent to defeat the Bankruptcy Code Conceals, destroys, mutilates, or falsifies documents relating to the debtor's property or affairs Withholds documents related to the debtor's property or financial affairs from the standing trustee or other officer of the court

17-4 Bankruptcy Fraud Penalties Typical penalty: a maximum of five years in prison or a maximum fine of $250,000, or both, per bankruptcy offense. Many cases include more various offenses. A typical bankruptcy case could involve false declarations, property concealment, conspiracy, mail fraud and money laundering. Section 802 of the Sarbanes-Oxley Act (SOX) of 2002: A possible 20 years in prison for one who knowingly alters, destroys, mutilates, conceals … with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case.

17-5 Frequent Bankruptcy Frauds Concealment of assets: the most common type of B fraud Fraudulent conveyances involve assist concealment Petition mills and multiple filing schemes are the second and third most common bankruptcy frauds. A petition mill typically involves unqualified persons who offer fee-based financial advice, credit counseling, and bankruptcy filing services. In multiple filing schemes, fraudsters typically file bankruptcy petitions in a number of states using different identities. Additional forms of bankruptcy fraud include trustee fraud, attorney fraud, forged filings, embezzlement, credit card fraud, and bust-outs.

17-6 Bankruptcy Proceedings Bankruptcy petitions are filed in federal bankruptcy courts, and the proceedings are administered by DOJ trustees. Bankruptcy trustees are responsible for maintaining fair and orderly proceedings as well as ensuring compliance with all bankruptcy laws. Trustees have an affirmative obligation to collect and review the required documentation and refer any cases of suspected fraud to the U.S. Attorney’s Office and sometimes to the FBI. They are also responsible for recommending to the U.S. Trustee the filing of a motion with the court for dismissal of the debtor’s petition if the debtor does not cooperate as required or commits fraud, or if the petition is abusive.

17-7 Filing of Documents, Discovery, and the Meeting of the Creditors The bankruptcy normally includes filing of many schedules, and federal tax returns, and detailed accounting and financial records, as well as financial statements for business debtors. Additional information can be obtained through discovery. Bankruptcy discovery rules incorporate the federal discovery rules and give any party in interest the right to obtain a court order to examine any entity involved with the case. In addition to the discovery process, all bankruptcy proceedings, with few exceptions, require debtors to appear in person at the first meeting of the creditors.

17-8 Sources of Discovery for Concealed Assets Tax Returns Bank, Brokerage, and Other Statements Loan Applications Cash Flow Analyses Credit Reports Public Records Unusual Assets Conveyances

17-9 Investigations of Businesses Review all sales records for sources of income Verify all vendors Review communications Scrutinize payments Verify the existence of inventories, fixed assets, and all other assets Study previous income tax returns and income statements for evidence of expenses for patents, R&D, and other intangible assets Review work in progress and unbilled work

17-10 Divorce Versus Bankruptcy Divorce attorneys do not always have the financial expertise that many bankruptcy attorneys have. Bankruptcy cases tend to involve creditors who could be engaged in asset concealment and who possess information-rich credit applications from debtors. Bankruptcy cases tend to involve fraudulent conveyances and hidden assets immediately prior to the filing. In divorce, however, one spouse could hide assets from the other for many years prior to the filing. While many bankruptcies genuinely have no assets to hide, divorcing couples are more likely to be solvent and have assets to hide.

17-11 Identity Theft The fastest growing crime in the United States, identity theft occurs when one person uses another’s personal identifying information, such as driver’s license or SSN, to obtain goods and/or services in the other person’s name. The problem of identity theft has existed throughout history, but it has become much more prevalent with the advent of the Internet and our electronic society.

17-12 Federal Laws Relating to Identity Theft The Identity Theft and Assumption Deterrence Act of 1998 This was the first major act passed to combat identify theft. It punishes anyone who …knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law. Under this act, means of identification is broadly interpreted to include any type of information that can identify a particular individual such as numbers for social security, credit cards, and drivers’ licenses.

17-13 Identity Theft Penalty Enhancement Act Congress created the crime of aggravated identity theft-- identity theft, or intended identity theft, committed in connection with certain other listed crimes. The penalty for most crimes listed in it is a mandatory extra two years in prison. Examples of listed crimes include the following: Thefts relating to employee benefit plans. False impersonation of citizenship. False statements in the acquisition of a firearm. Crimes relating to mail, bank, and wire fraud. Crimes relating to nationality and citizenship, passports, and visas.

17-14 The Internet False Identification Prevention Act of 2000 This act makes selling counterfeit versions of certain official identification cards illegal. The law also makes it illegal to sell electronic templates for making counterfeit identification cards. There is a potential one-year prison sentence if one fake identification card is made from a given template, but the potential prison sentence increases to 20 years if the template is used to make five or more cards. Plenty of Web sites and message boards contain instructions on how to make false identification cards. The process is not terribly difficult with a computer.

17-15 Identify Theft Prevention People should be aware of possible fraudsters: Dumpster divers and garbage pickers. Shoulder surfers Hackers Company insiders Impersonators Mail thieves Public records diggers Scammers (includes phishers and phone scammers) Fake ATM Purse snatchers and pickpockets

17-16 Warning Signs of Identity Theft Unauthorized address changes A serious warning sign is evidence of any type of unauthorized change in a mailing address. Unauthorized account transactions All monthly statements should be carefully inspected for unauthorized activity. Improper transactions should be immediately reported. Incorrect information on credit reports Any significant incorrect information on a credit report could indicate identity fraud. Bill collectors Unfortunately, one of the first symptoms of identity fraud victimization could be phone calls or letters from bill collectors for unknown credit transactions.

17-17 Identity Theft Investigation Identity thieves can be caught various ways. Tracing The true identities of fraudsters can sometimes be obtained by using video surveillance records, telephone records, and the Internet methods discussed in the earlier chapter on forensic science to trace them. Catching thieves in the act In theory, identity thieves can be caught in the act of obtaining or using others’ identity information. This approach is not generally helpful because immediate arrests do not normally take place unless a law enforcement officer happens to be at the scene of the crime. Controlled delivery This is the strongest and most reliable way to catch identity thieves.